Skip to content

Commit a11816d

Browse files
authored
Merge branch 'MicrosoftDocs:main' into Broken-link-lajanuar
2 parents 3bc9729 + 77915ec commit a11816d

File tree

989 files changed

+5063
-4188
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

989 files changed

+5063
-4188
lines changed

.openpublishing.redirection.json

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -533,6 +533,11 @@
533533
"redirect_url": "/azure/frontdoor/front-door-geo-filtering",
534534
"redirect_document_id": false
535535
},
536+
{
537+
"source_path_from_root": "/articles/frontdoor/front-door-geo-filtering.md",
538+
"redirect_url": "/azure/web-application-firewall/afds/waf-front-door-geo-filtering",
539+
"redirect_document_id": false
540+
},
536541
{
537542
"source_path_from_root": "/articles/frontdoor/standard-premium/edge-locations.md",
538543
"redirect_url": "/azure/frontdoor/edge-locations-by-region",
@@ -22343,6 +22348,11 @@
2234322348
"redirect_url": "/azure/storage/common/customer-managed-keys-configure-key-vault",
2234422349
"redirect_document_id": false
2234522350
},
22351+
{
22352+
"source_path_from_root": "/articles/storage/common/customer-managed-keys-configure-key-vault.md",
22353+
"redirect_url": "/azure/storage/common/customer-managed-keys-configure-existing-account",
22354+
"redirect_document_id": false
22355+
},
2234622356
{
2234722357
"source_path_from_root": "/articles/storage/common/encryption-customer-managed-keys.md",
2234822358
"redirect_url": "/azure/storage/common/customer-managed-keys-overview",

articles/active-directory-b2c/configure-authentication-sample-react-spa-app.md

Lines changed: 13 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -7,15 +7,15 @@ manager: CelesteDG
77
ms.service: active-directory
88
ms.workload: identity
99
ms.topic: how-to
10-
ms.date: 07/07/2022
10+
ms.date: 08/25/2022
1111
ms.author: kengaderdus
1212
ms.subservice: B2C
1313
ms.custom: "b2c-support"
1414
---
1515

1616
# Configure authentication in a sample React single-page application by using Azure Active Directory B2C
1717

18-
This article uses a sample React single-page application (SPA) to illustrate how to add Azure Active Directory B2C (Azure AD B2C) authentication to your React apps.
18+
This article uses a sample React single-page application (SPA) to illustrate how to add Azure Active Directory B2C (Azure AD B2C) authentication to your React apps. The React SPA also calls an API that's protected by Azure AD B2C itself.
1919

2020
## Overview
2121

@@ -121,7 +121,7 @@ Now that you've obtained the SPA sample, update the code with your Azure AD B2C
121121
| b2cPolicies | authorities | Replace `your-tenant-name` with your Azure AD B2C [tenant name](tenant-management.md#get-your-tenant-name). For example, use `contoso.onmicrosoft.com`. Then, replace the policy name with the user flow or custom policy that you created in [step 1](#step-1-configure-your-user-flow). For example: `https://<your-tenant-name>.b2clogin.com/<your-tenant-name>.onmicrosoft.com/<your-sign-in-sign-up-policy>`. |
122122
| b2cPolicies | authorityDomain|Your Azure AD B2C [tenant name](tenant-management.md#get-your-tenant-name). For example: `contoso.onmicrosoft.com`. |
123123
| Configuration | clientId | The React application ID from [step 2.3](#23-register-the-react-app). |
124-
| protectedResources| endpoint| The URL of the web API: `http://localhost:5000/api/todolist`. |
124+
| protectedResources| endpoint| The URL of the web API: `http://localhost:5000/hello`. |
125125
| protectedResources| scopes| The web API scopes that you created in [step 2.2](#22-configure-scopes). For example: `b2cScopes: ["https://<your-tenant-name>.onmicrosoft.com/tasks-api/tasks.read"]`. |
126126

127127
Your resulting *src/authConfig.js* code should look similar to the following sample:
@@ -156,7 +156,7 @@ export const msalConfig: Configuration = {
156156

157157
export const protectedResources = {
158158
todoListApi: {
159-
endpoint: "http://localhost:5000/api/todolist",
159+
endpoint: "http://localhost:5000/hello",
160160
scopes: ["https://your-tenant-namee.onmicrosoft.com/tasks-api/tasks.read"],
161161
},
162162
}
@@ -171,7 +171,7 @@ In the sample folder, open the *config.json* file. This file contains informatio
171171

172172
|Section |Key |Value |
173173
|---------|---------|---------|
174-
|credentials|tenantName| The first part of your Azure AD B2C [tenant name](tenant-management.md#get-your-tenant-name). For example: `contoso`.|
174+
|credentials|tenantName| Your Azure AD B2C [domain/tenant name](tenant-management.md#get-your-tenant-name). For example: `contoso.ommicrosoft.com`.|
175175
|credentials|clientID| The web API application ID from step [2.1](#21-register-the-web-api-application). In the [earlier diagram](#app-registration), it's the application with **App ID: 2**.|
176176
|credentials| issuer| (Optional) The token issuer `iss` claim value. Azure AD B2C by default returns the token in the following format: `https://<your-tenant-name>.b2clogin.com/<your-tenant-ID>/v2.0/`. Replace `<your-tenant-name>` with the first part of your Azure AD B2C [tenant name](tenant-management.md#get-your-tenant-name). Replace `<your-tenant-ID>` with your [Azure AD B2C tenant ID](tenant-management.md#get-your-tenant-id). |
177177
|policies|policyName|The user flow or custom policy that you created in [step 1](#step-1-configure-your-user-flow). If your application uses multiple user flows or custom policies, specify only one. For example, use the sign-up or sign-in user flow.|
@@ -182,7 +182,7 @@ Your final configuration file should look like the following JSON:
182182
```json
183183
{
184184
"credentials": {
185-
"tenantName": "<your-tenant-name>",
185+
"tenantName": "<your-tenant-name>.ommicrosoft.com",
186186
"clientID": "<your-webapi-application-ID>",
187187
"issuer": "https://<your-tenant-name>.b2clogin.com/<your-tenant-ID>/v2.0/"
188188
},
@@ -201,7 +201,7 @@ Your final configuration file should look like the following JSON:
201201

202202
## Step 5: Run the React SPA and web API
203203

204-
You're now ready to test the React scoped access to the API. In this step, run both the web API and the sample React application on your local machine. Then, sign in to the React application, and select the **TodoList** button to start a request to the protected API.
204+
You're now ready to test the React scoped access to the API. In this step, run both the web API and the sample React application on your local machine. Then, sign in to the React application, and select the **HelloAPI** button to start a request to the protected API.
205205

206206
### Run the web API
207207

@@ -251,11 +251,13 @@ You're now ready to test the React scoped access to the API. In this step, run b
251251
![Screenshot that shows the React sample app with the login link.](./media/configure-authentication-sample-react-spa-app/sample-app-sign-in.png)
252252

253253
1. Choose **Sign in using Popup**, or **Sign in using Redirect**.
254-
1. Complete the sign-up or sign in process. Upon successful sign in, you should see your profile.
255-
1. From the menu, select **Hello API**.
256-
1. Check out the result of the REST API call. The following screenshot shows the React sample REST API return value.
257-
254+
1. Complete the sign-up or sign in process. Upon successful sign-in, you should see a page with three buttons, **HelloAPI**, **Edit Profile** and **Sign Out**.
258255
![Screenshot that shows the React sample app with the user profile, and the call to the A P I.](./media/configure-authentication-sample-react-spa-app/sample-app-call-api.png)
256+
1. From the menu, select **HelloAPI** button.
257+
1. Check out the result of the REST API call. The following screenshot shows the React sample REST API return value:
258+
259+
:::image type="content" source="./media/configure-authentication-sample-react-spa-app/sample-app-call-api-result.png" alt-text="Screenshot of the React sample app with the user profile, and the result of calling the web A P I.":::
260+
259261

260262
## Deploy your application
261263

89.7 KB
Loading

articles/active-directory-b2c/microsoft-graph-operations.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -60,8 +60,8 @@ Note, the [list](/graph/api/authentication-list-phonemethods) operation returns
6060

6161
An email address that can be used by a [username sign-in account](sign-in-options.md#username-sign-in) to reset the password. For more information, see [Azure AD authentication methods API](/graph/api/resources/emailauthenticationmethod).
6262

63-
- [Add](/graph/api/emailauthenticationmethod-post)
64-
- [List](/graph/api/emailauthenticationmethod-list)
63+
- [Add](/graph/api/authentication-post-emailmethods)
64+
- [List](/graph/api/authentication-list-emailmethods)
6565
- [Get](/graph/api/emailauthenticationmethod-get)
6666
- [Update](/graph/api/emailauthenticationmethod-update)
6767
- [Delete](/graph/api/emailauthenticationmethod-delete)

articles/active-directory/app-provisioning/on-premises-scim-provisioning.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.service: active-directory
77
ms.subservice: app-provisioning
88
ms.topic: conceptual
99
ms.workload: identity
10-
ms.date: 07/05/2022
10+
ms.date: 08/25/2022
1111
ms.author: billmath
1212
ms.reviewer: arvinh
1313
---
@@ -22,6 +22,7 @@ The Azure Active Directory (Azure AD) provisioning service supports a [SCIM 2.0]
2222
- An Azure AD tenant with Azure AD Premium P1 or Premium P2 (or EMS E3 or E5). [!INCLUDE [active-directory-p1-license.md](../../../includes/active-directory-p1-license.md)]
2323
- Administrator role for installing the agent. This task is a one-time effort and should be an Azure account that's either a hybrid administrator or a global administrator.
2424
- Administrator role for configuring the application in the cloud (application administrator, cloud application administrator, global administrator, or a custom role with permissions).
25+
- A computer with at least 3 GB of RAM, to host a provisioning agent. The computer should have Windows Server 2016 or a later version of Windows Server, with connectivity to the target application, and with outbound connectivity to login.microsoftonline.com, other Microsoft Online Services and Azure domains. An example is a Windows Server 2016 virtual machine hosted in Azure IaaS or behind a proxy.
2526

2627
## Deploying Azure AD provisioning agent
2728
The Azure AD Provisioning agent can be deployed on the same server hosting a SCIM enabled application, or a seperate server, providing it has line of sight to the application's SCIM endpoint. A single agent also supports provision to multiple applications hosted locally on the same server or seperate hosts, again as long as each SCIM endpoint is reachable by the agent.
@@ -49,6 +50,9 @@ Once the agent is installed, no further configuration is necesary on-prem, and a
4950
12. Go to the **Provisioning** pane, and select **Start provisioning**.
5051
13. Monitor using the [provisioning logs](../../active-directory/reports-monitoring/concept-provisioning-logs.md).
5152

53+
The following video provides an overview of on-premises provisoning.
54+
> [!VIDEO https://www.youtube.com/embed/QdfdpaFolys]
55+
5256
## Additional requirements
5357
* Ensure your [SCIM](https://techcommunity.microsoft.com/t5/identity-standards-blog/provisioning-with-scim-getting-started/ba-p/880010) implementation meets the [Azure AD SCIM requirements](use-scim-to-provision-users-and-groups.md).
5458

articles/active-directory/authentication/active-directory-certificate-based-authentication-android.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.date: 02/16/2022
1010

1111
ms.author: justinha
1212
author: justinha
13-
manager: karenhoran
13+
manager: amycolannino
1414
ms.reviewer: annaba
1515

1616
ms.collection: M365-identity-device-management

articles/active-directory/authentication/active-directory-certificate-based-authentication-get-started.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.date: 05/04/2022
1010

1111
ms.author: justinha
1212
author: justinha
13-
manager: karenhoran
13+
manager: amycolannino
1414
ms.reviewer: annaba
1515

1616
ms.collection: M365-identity-device-management

articles/active-directory/authentication/active-directory-certificate-based-authentication-ios.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.date: 05/04/2022
1010

1111
ms.author: justinha
1212
author: justinha
13-
manager: karenhoran
13+
manager: amycolannino
1414

1515
ms.collection: M365-identity-device-management
1616
---

articles/active-directory/authentication/active-directory-passwords-faq.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ metadata:
1010
ms.date: 08/13/2021
1111
ms.author: justinha
1212
author: justinha
13-
manager: karenhoran
13+
manager: amycolannino
1414
ms.reviewer: tilarso
1515
ms.collection: M365-identity-device-management
1616
title: Self-service password reset frequently asked questions

articles/active-directory/authentication/certificate-based-authentication-faq.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ metadata:
1010
ms.date: 02/09/2022
1111
ms.author: justinha
1212
author: vimrang
13-
manager: karenhoran
13+
manager: amycolannino
1414
ms.reviewer: vimrang
1515
ms.collection: M365-identity-device-management
1616
title: Frequently asked questions about Azure AD certificate-based authentication (CBA)

0 commit comments

Comments
 (0)